Saltar al contenido

Microsoft blinks again, promises to clean after the Win7 «Stretch» mess of the black screen

The mess behind the UEFI patch Microsoft KB 4524244

Microsoft introduced a new «Stretch» background error in its latest Win7 patch, then claimed that it would solve the problem only for paying customers. Now, it looks like everyone will understand, but how?

I’m training a puppy right now and I know exactly how it feels to clean up unwanted mess.

As I mentioned last week, the final update of the Win7 service introduced an error in the «Stretch» wallpaper management mode: if you set the Win7 wallpaper to Stretch, a sinister black appears after the patch is installed.

Talk about a noble purpose for a revered product. But it got worse.

Someone from Microsoft finally acknowledged the obvious mistake (it only lasted a week) and added this zinger to the official announcement:

We are working on a resolution and will provide an update in a future release for organizations that have purchased Windows 7 Extended Security Updates (ESU).

Removing the tar and feather crowd: How could Microsoft get rid of charging people to fix their own mistake?

Many people saw this as a clumsy attempt to force people to leave Windows 7 and pay for Windows 10. The gray beard took it for another shave of the Hanlon razor worn by Microsoft.

Looks like the adults in the company woke up over the weekend. The KB article has been modified to read:

We are working on a resolution and will provide an update in a future release, which will be released to all customers running Windows 7 and Windows Server 2008 R2 SP1.

Which immediately begs the question: How?

Will Windows 7 receive a monthly amount in February for everyone? Will it include a fix for this bad bug, in addition to fixes for as yet unannounced security holes? Will there be two monthly accumulation packages, one for paying customers and the other for hoi polloi?

Remember that Microsoft has already announced in Advisory Security ADV200001 that there is another security hole in the Internet Explorer JScript engine, CVE-2020-0674. Also, there was no commitment to fix that security hole in unpaid Win7.

I haven’t seen a preview of the February monthly set yet. There was also no official announcement of the suspension of Win7 at the end of the service. Those of us who don’t pay for Win7’s extensive security updates, say 300 or 400 million of us, are scratching our heads.

As a service.